Sciweavers

1156 search results - page 146 / 232
» Bayesian Networks for Reliability Analysis of Complex System...
Sort
View
CANS
2005
Springer
86views Cryptology» more  CANS 2005»
15 years 9 months ago
On the Performance and Analysis of DNS Security Extensions
The Domain Name System (DNS) is an essential component of the critical infrastructure of the Internet. The role of DNS is vital, as it is involved in virtually every Internet tran...
Reza Curtmola, Aniello Del Sorbo, Giuseppe Atenies...
139
Voted
IMC
2006
ACM
15 years 9 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
130
Voted
ISCIS
2009
Springer
15 years 10 months ago
A web-based data source for metabolomics
—With the development of improved and cost-effective technologies, it is now possible to detect thousands of metabolites in biofluids or specific organs, and reliably quantify th...
Ali Cakmak, Arun Dsouza, Richard Hanson, Gultekin ...
138
Voted
FGCS
2008
99views more  FGCS 2008»
15 years 3 months ago
An innovative workflow mapping mechanism for Grids in the frame of Quality of Service
The advent of Grid environments made feasible the solution of computational intensive problems in a reliable and cost-effective way. As workflow systems carry out more complex and...
Dimosthenis Kyriazis, Konstantinos Tserpes, Andrea...
ANCS
2005
ACM
15 years 9 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna